Cryptography-Digest Digest #425, Volume #11 Sun, 26 Mar 00 17:13:00 EST
Contents:
Re: Gray Code like (Tim Tyler)
Re: Download Random Number Generator from Ciphile Software (Taneli Huuskonen)
Re: Hashes! (newbie question) (Boris Kazak)
Re: Fastest DES implementation on Intel PIII ? ("Kasper Pedersen")
Re: new Echelon article (JimD)
What do these results mean? (Peter Rabbit)
Re: Card shuffling (wtshaw)
Re: OAP-L3: Answer me these? (Jerry Coffin)
Re: OAP-L3: Answer me these? (Jerry Coffin)
Re: OAP-L3: Answer me these? (Jerry Coffin)
Re: OAP-L3: Answer me these? (Jerry Coffin)
----------------------------------------------------------------------------
From: Tim Tyler <[EMAIL PROTECTED]>
Subject: Re: Gray Code like
Reply-To: [EMAIL PROTECTED]
Date: Sun, 26 Mar 2000 19:15:11 GMT
[EMAIL PROTECTED] wrote:
[LFSR construction]
: Or detect when all but the MS bit is zero and invert the feedback path [...]
Thanks for posting this. It may wind up as the thing that I learned today.
--
__________
|im |yler The Mandala Centre http://www.mandala.co.uk/ [EMAIL PROTECTED]
I'm from the government and I'm here to help you.
------------------------------
From: [EMAIL PROTECTED] (Taneli Huuskonen)
Crossposted-To: talk.politics.crypto
Subject: Re: Download Random Number Generator from Ciphile Software
Date: 26 Mar 2000 22:17:20 +0300
=====BEGIN PGP SIGNED MESSAGE=====
In <[EMAIL PROTECTED]> Anthony Stephen Szopa
<[EMAIL PROTECTED]> writes:
[...]
>array files. Rotate Set3 and the state of the primary array files
>change and this will change the state of Set4 and Set5. Also,
According to your Web page, you rotate Set1 rather than Set3, which
obviously leaves Set4 unchanged. However, this is a minor nit; if you
fixed this glitch in the obvious way, essentially the same problem would
remain.
[...]
>No MEANINGFUL relationship(s) such as the ones you suggest above can
>be made. You can write the relationships symbolically, but knowing
>only the data we assume we have, these relationships cannot be
>quantified. They remain variables or place holders waiting for
>values which cannot be determined.
Here's an excercise. Pick three permutations of the numbers 0..9, say
P1, P2, and P3. Form P4 by using P2 to index P1, P5 by using P3 to
index P4, P6 by using P3 to index P2, and P7 by using P6 to index P1.
Assuming we only know P7, the value of any one of P1, P2, P3, P4, or P6
could be anything. How about P5?
Just do it for real, and you might learn something.
Taneli Huuskonen
=====BEGIN PGP SIGNATURE=====
Version: 2.6.3i
Charset: noconv
iQB1AwUBON5hSwUw3ir1nvhZAQEC2wMAwiHc1DDNK7PC2XNuhti+hHp3bAcvppDT
E9no4LHfAM0ul7NZ+Wb4l7PkMJbouHrQMEvzwaNWDKxlbNVZfFQY4S5NqC7acfnl
3BA0qqlR6TXztRSZ8PSQWLRA9ByJep6+
=0mG3
=====END PGP SIGNATURE=====
--
I don't | All messages will be PGP signed, | Fight for your right to
speak for | encrypted mail preferred. Keys: | use sealed envelopes.
the Uni. | http://www.helsinki.fi/~huuskone/ | http://www.gilc.org/
------------------------------
From: Boris Kazak <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Subject: Re: Hashes! (newbie question)
Date: Sun, 26 Mar 2000 19:52:08 GMT
Simon Johnson wrote:
>
> I am designing a new hash for a login system and I have decided to seed a
> PRNG and produce a 160bit hash out of a random number generator.. But to do
> that I must first pre-hash the text into a number. After many hours of
> experimentation, if produced the following algorithm, I tested it over the
> (256-1)*3 bits.
>
> For n = 1 to len(text)
> a = sqrt((a+n)*asc(mid(text,n,1))) 'square root ( a * n * (the ascii rep
> of the n'th char of text))
> Next N
>
> I would like to know if this function produces any collisions?
=====================
I could not figure out, how the proposed algorithm works.
1) Variable a must be somehow initialized.
2) Am I correct in assuming that ' is a separator between
a pseudocode statement and a comment?
3) If not, then what arithmetic or logical operation
corresponds to ' ?
4) Assuming that ' starts a comment, operation uses a+n in
pseudocode body, but uses a*n in explanatory comment.
Which one is true?
5) Since the result of calculations is a floating number, please
be specific about the precision (32, 64, 80 or 128 bit),
how the roundoffs are handled during multiplication and
square root calculations, how many significant digits do
you keep in your final result.
6) And why use floating arithmetic at all? Integer operations
are absolutely identical on all computer platforms, are
fast, easily chainable and in general easier to program and
evaluate.
Best wishes BNK
------------------------------
From: "Kasper Pedersen" <[EMAIL PROTECTED]>
Subject: Re: Fastest DES implementation on Intel PIII ?
Date: Sun, 26 Mar 2000 20:20:46 GMT
"Eric Young" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]...
> Paul Koning wrote:
<..cutting..>
>
> The x86 assembler was optimized for the pentium, but it is still quite
> good on x86-P6 CPUs.
>
> eric
It was absolutely-super-optimized for the P5 cpu! But it hurt quite a bit on
the P6.2, P6.3, K6.
When we optimized for P6.2, K6, we _did_ gain a lot of speed, but at far as
I remember, it's now really slow on P5.
He'd probably have to include both routines, which wouldn't be a problem as
I believe they have compatible data areas.
/Kasper
------------------------------
From: [EMAIL PROTECTED] (JimD)
Subject: Re: new Echelon article
Reply-To: JimD
Date: Sun, 26 Mar 2000 19:31:01 GMT
On Sat, 25 Mar 2000 11:09:53 +0000, [EMAIL PROTECTED] wrote:
>Is there anyway to insert crypto hardware into cellphones?
>
>I have 4 Nokia phones and 1 Nortel - as far as I'm aware none of the
>manufacturers publish details on how to stick extra hardware into the
>phones.
Not practical, is it? How would you communicate securely?
Every one you telephone would have to have compatible
hardware (and software setup).
Nortel manufacture a secure telephone system which will handle
data as well, using a public key crypto system, but again
your correspondents would also need to be suitably equipped.
The present encryption fitted to digital mobile 'phones
(in the UK at least) is more than adequate to defeat
casual interception. (By people with radio scanners).
--
Jim Dunnett.
dynastic at cwcom.net
He who laughs last doesn't
get the joke.
------------------------------
From: Peter Rabbit <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Subject: What do these results mean?
Date: Sun, 26 Mar 2000 20:38:38 GMT
I'm no big light in crypto and do not have a lot of time to study the
subject, but I do dabble. I've written a cipher that is a mix between
Transposition, Block and Stream (I think) and it seems to do the job.
When running the results thru "ent" I usually get results like...
Entropy=7.9983007 Bits per Byte
Optimum compression of 10120 Bytes by 0 percent
Chi Square = 238.79
Arithmetic mean 127.9326 (127.5 = rand)
Monte Carlo PI=3.09845 (1.37%)
Serial correlation coeff = -0.002557
these results vary with better numbers for bigger files. The file
encrypted here consisted of 10,000 "1"s. Loading the encr. file into
Wordpad and doing a search of any 2 Byte repetition (case sensitive)
revealed usually NO repetition or, occasionally, 1 repetition. On larger
files 2 Byte key repetition occurs about every 60,000 or so. That is as
it should be given that there are 2^16 -1 possibilities for 2 Bytes.
Following Alexander Pukall's example and changing 1 Byte in the
encrypted file by 1 Bit (from "a" to "b" or something) and then
decrypting has the following effect.
Dispersed throughout the file of 10120 Bytes I fing 42 - 5 Byte
sequences that were changed. All 5 Byte sequences are different. The
files are read into memory in 16k blocks. (The password gets hashed into
a 256 Byte key.
My question is... What does that mean? Do the 5 Bytes indicate a 40 Bit
encryption or 42*40=1680 Bits?
Thx, Peter Rabbit
------------------------------
From: [EMAIL PROTECTED] (wtshaw)
Subject: Re: Card shuffling
Date: Sun, 26 Mar 2000 14:55:56 -0600
In article <[EMAIL PROTECTED]>, Mok-Kong Shen
<[EMAIL PROTECTED]> wrote:
> Just a passing thought: To add some entertainment value of one's
> message for the opponent such that he doesn't feel his job to be
> too dull and uninteresting, one could with today's techniques
> easily emply from time to time codes with diverse nice graphical
> symbols, e.g. those of cards or, what I think is quite good looking,
> hieroglyphs. (The opponent needs to go outdoors to find the Rosseta
> stone and the fresh air and physical activity help to keep his body
> fit.)
>
You are absolutely correct
Imagine the real necessity of looking at a physical encrypted message as
in the CIA sculpture. Or, in this case a few playing cards. I'll use
these lines to build some keys for my newest child, number 31 of a series,
Pinsk, which can have a transposition size of 11 or 22 hexits. Input is
in modified 26, output in base 52, or card deck.
Sub1(Pk): zpajlqdwketfbnrgchuvmxysio
Sub2(Pk): DEwtApaPbFrVKufcxjBgIWGQkizlLMdqmeNvCRsnYZXOhTyHSUJo
Trans(Pk): vpimshjqdarebgftolcukn
Pt formatted in groups of 12 for Pinsk 22: this|is|a|ve ry|healthful
|observation
Ct, base 52: IsdRkMnDWK mdxZNXcseB QFzohIwfQv
As cards: (10)<7>{5}[6]{Q} (A)<2>(5)[J](Q) {A}{5}<Q>[A][2]
[Q]{4}<7>{6}(3) [5](7)<A><3>{9} (10)<J>{7}[5]<10>
Real quickly, I spot that 5 of spades is used, maybe other dups too. If
these cards were stacked at te beginning of a deck, that might be missed.
Pinsk does not do carriage returns, blank lines, or use W for other than a
space. This is a marginal alorithm in some respects as it does not fully
meet my criteria, but with an active transposition key with the others,
keyspace can be equivalent with 88.4 + 225.6 + 69.9 bits. If you want to
do it longhand, 9 digit mathematics is involved.
Since I have take the base 52 side trip, guess I need to pull another one,
that is similiar, out of the hat. The math is done, but there is a format
challenge.
--
To see the results of GW Bush's shaddow, visit the Valley;
notice the miserable conditions he allows to fester.
------------------------------
From: Jerry Coffin <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Answer me these?
Date: Sun, 26 Mar 2000 14:57:33 -0700
In article <e#aujAVl$GA.215@cpmsnbbsa02>, [EMAIL PROTECTED]
says...
> I think we have to part company a bit on this. I am not
> comfortable saying that quantum computers won't become a
> reality in my lifetime.
They're already a reality: in fact, there was a recent announcement
of the first 7-qubit computer having been built and done something.
The question is only whether they'll actuall accomplish anything
useful. Right now the quantum computers they've gotten to work at
all are roughly equivalent to a small child counting on hish fingers;
barely able to get correct answers, and certainly not doing anything
complex or even doing simple things quickly.
OTOH, there was undoubtedly a time at which Richard Feynman, Albert
Einstein, etc., could only barely keep track of their own ages. Such
humble beginnings don't mean that quantum computing can't accomplish
extremely useful things before all is said and done...
--
Later,
Jerry.
The universe is a figment of its own imagination.
------------------------------
From: Jerry Coffin <[EMAIL PROTECTED]>
Subject: Re: OAP-L3: Answer me these?
Date: Sun, 26 Mar 2000 14:57:35 -0700
In article <%62D4.70010$[EMAIL PROTECTED]>,
[EMAIL PROTECTED] says...
> Um no. No real OTP can be cryptanalyzed. You would have to either break
> the RNG used to encrypt or bribe etc..
>
> There is no such thing as a OTP bit flipping attack. You are making things
> up now.
No, you're just ignoring reality. I'm not going to bother explaining
things again, since it's clear you're simply not paying attention.
--
Later,
Jerry.
The universe is a figment of its own imagination.
------------------------------
From: Jerry Coffin <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Answer me these?
Date: Sun, 26 Mar 2000 14:57:40 -0700
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
says...
[ ... ]
> "Could a software engineer, using as a specification only the
> descriptive material available at your web site, duplicate your
> encryption program?"
>
> I certainly believe this: anyone experienced in the art can do
> so easily at least through creating the OTPs. All of the processes
> are fundamentally very simple and well known universally. Only no
> one has put them all together to generate random numbers before,
> as far as I know.
[ and on an on, without ever really answering the question ]
Anthony, you should forget about cryptography and got int politics
instead -- the trick of repeating the question, and then talking
about whatever you feel like, as if it provided an answer, works well
in politics but won't make your garbage work any better.
To the OP: as implied by his reams of beating around the bush without
ever actually admitting it, the short answer is that, NO he doesn't
provide anywhere close to the level of detail necessary.
--
Later,
Jerry.
The universe is a figment of its own imagination.
------------------------------
From: Jerry Coffin <[EMAIL PROTECTED]>
Crossposted-To: talk.politics.crypto
Subject: Re: OAP-L3: Answer me these?
Date: Sun, 26 Mar 2000 14:57:37 -0700
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
says...
[ ... ]
> I will not accuse you of being a liar.
> I will not accuse you of being an idiot.
> I will not accuse you of being stupid.
You then go on to attempt to imply each of the above, in essence
making a liar of yourself.
> Although a case could be supported for each of the above.
>
> 1) CASE: liar. You say the theory, and specification of the
> procedures and processes have not been made available. Not true.
> The theory, and specification of the procedures and processes have
> been available for some time now at http://www.ciphile.com
This is where the BIG lie comes into the picture: you have some
garbage that you SAY covers the theory and the specification of
procedures and processes, but as has been pointed out repeatedly in
the past, what you've posted covers nothing of the sort; it contains
nothing more than hand-waving. Based on its content, there are two
possibilities: either you don't really know how your software works,
or else you're intentionally covering things up to prevent the rest
of the world from knowing how it works. Regardless of how they got
to the sad state they're in, the portions of your help files that
talk about the algorithm you use are utterly worthless and useless.
> 2) CASE: idiot. "01234567890123456789... Each output digit will
> occur an exactly equal number of times making a bias of exactly
> zero." Not quite. Bias refers to any patterns that can be
> discerned and exploited cryptoanalytically. There is clearly a
> pattern here, the sequence is predictable, etc.
Bias does NOT refer to any pattern that can be discerned and
exploited. Bias refers specifically and ONLY to a sequence
containing different digits at different frequencies. As expressed
(in decimal) the sequence above is absolutely free of bias: every
digit occurs exactly twice. If each digit is expressed in binary,
there is a bias: 0 bits occur more often than 1 bits.
The obvious predictability in this case is not bias, but correlation:
correlation refers to being able to predict the next part of the
sequence based on previous parts of the sequence. The sequence given
above is free of bias, but highly correlated.
It's long been said that it's better to stay silent and be thought a
fool than speak and remove all doubt. Even if he doesn't learn the
accepted terminology for the concepts, anybody designing a cipher
should certainly have thought about things enough to classify
predictability into the two basic areas normally referred to as bias
and correlation. By claiming that there IS only one class, you've
shown not only that you're ignorant of the terminology, but that
you've given insufficient thought to the ways in which an attacker
can and will look at the output from your program. In short, by
speaking, you removed all doubt; it's obvious that you can't possibly
have taken into account the factors necessary to do a good job of
design a cipher, because you deny the very existence of those
factors.
> 3) CASE: stupid. "By adding a new process you inherently add
> ability to "mix things up even more." That is simply not the
> case..." Oh, really? In the popular state lotteries or in the
> gambling game of keno, you may pick six numbers. Six of eighty
> ping pong balls numbered 1 - 80 are randomly selected. Let's
> say you bet one dollar for your pick six. If I decide to add
> 80 more ping pong balls making a total of 160 and keep your
> potential winnings the same, will you now bet two dollars?
Your comparison is invalid for a number of reasons. First and
foremost, adding more balls to a lotto machine does NOT add "a new
process" -- it only adds more balls that will be processed in exactly
the same fashion. Rather than being analogous to a new encryption
algorithm, it's roughly equivalent to using a larger key with exactly
the same algorithm (which of course requires an algorithm that
supports both key sizes).
Second, with the balls in a lotto machine, much like a cipher, there
may be unforseen side-effects of using twice as many balls. In the
case of a lotto machine, you would probably need a bigger box and/or
a longer time for them to mix up before the order of them balls is
completely unpredictable. If you used exactly the same process
otherwise, it's entirely possible that the balls simply would not mix
well at all.
Now, to be truly analogous to adding a new process, what you want to
discuss would be something that retains exactly the same number of
balls, but attempts to randomize them better. For a couple of
examples, the balls are normally rolled into the box in order, then a
blower is turned out to mix them up. Two possible processes you
could add would be to 1) mix the balls up ahead of time, so they're
rolled into the machine in a random order, or 2) have the air
pressure and/or volume from the blower varied in a random fashion.
I don't believe that either of these would have any good effect at
all -- statistical studies have shown that the output is already
quite thoroughly unpredictable, and therefore adding these new
processes would accomplish nothing useful.
> You admit to not having read the Help files or insist that
> you are unable to understand them, you have not gotten the
> software: in other words, you don't know what you are talking
> about yet you seem to be an authority on OAP-L3. Incredible!
I've read and understood the help files. They were _obviously_
written to impress people with complexity, NOT to provide adequate
information for cryptanalysis or say anything about the strength of
the encryption provded. Since you claim they provide real, solid
information, there are really only two possiblities: either you're so
grossly incompetent that you haven't a clue of what you need to
provide, or else you're intentionally withholding the information you
know is necessary.
> I really get satisfaction knowing that my work has gotten to you.
> Can't refute the facts can you.
Facts, by their nature, can't be refuted. Fortunately for those of
us who refute your claims on a regular basis, facts are only rarely
to be found among your claims. So far, on the rare occassion that
you DO say something that's truly factual, it's not really related to
your original argument at all.
> There is a very real encryption
> software package here to address. It's tangible.
The software is tangible. The security is not.
> But I am afraid nearly everything you have said to date has been
> unscientific, insupportable or unsupported, and without merit.
You should be afraid, but mostly because the criticisms of your
software are well supported by facts.
> By the way, I have had tremendous traffic at my web site where many
> many copies of the OAR-L3: Original Absolutely Random Level3 random
> number generation software has been being downloaded.
Great. What does this have to do with anything? Do you honestly
believe that lots of traffic somehow means the product is of high
quality? In the past you've seemed intelligent but misguided.
Recently, your statements about traffic levels, who's downloaded your
software, etc., make it sound a great deal more as if you aren't very
intelligent after all.
--
Later,
Jerry.
The universe is a figment of its own imagination.
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************